IntelCrawler Announces New Revolutionary Cyber Tool

Share Article

Connecting the dots of over 3 Billion aggregated cyber points

“The ability to search across multi-tier databases gives the cyber investigator access to comprehensive historical data and intelligence, where one additional cyber print could escalate an investigation.”

Today IntelCrawler has released a new global intelligence tool to help security professionals in their battle against cybercrime. Its entry level service is a scan of over 3 billion IP’s and 200 million domain names, with narrowed results that can be compared with queries to an array of cyber intelligence data bases. The idea is that the cyber criminals play in a finite arena…and drilling down to their probable IP may actually provide a physical location.

“Many of today’s organizations who face daily cyber threats would like to take an “active defense” and identify the actual group posing the threat and possibly even put a face on the hacker” stated Andrey Komarov, IntelCrawler CEO at the World Cyberspace Cooperation Summit IV at Stanford last month. “By using the IntelCrawler tool you can narrow the probability field of cyber prints down to continents, cities, ISP’s, and possibly even a keyboard.”

IntelCrawler launches specific data resources in the battle against cybercrime

Reverse Fingerprinting
Multi-tier Reverse Fingerprinting provides you an opportunity to search hosts by indexed network banners and TCP/IP footprints in the whole IPv4 range. database has more than 3,000,000,000 scanned IP addresses with DNS resolved logic name (FQDN), geographical location (GEOIP) of every host, and ISP or cellular operator name, which makes it a unique service in the world of cyber intelligence and research.        
Unlike other services, can use various additional identifiers, such as strings from HTTP prints, SNMP community strings, Telnet banners of network devices, FTP daemons, and many other network service or device characteristics.

Reverse Whois Lookup
IntelCrawler provides you an opportunity to discover the owner of a current or historical domain name by one or several identifiers such as an individual or a company's name, phone number, or email address.

Cybercrime Intelligence collects gigabytes of information from public and private cybercrime communities, as well as other sources and aggregates it into a new search engine for the corporate and public sector to use it for cybercrime intelligence. Data science, predictive analytics, and Big Data help can transform the fight against cybercrime by the association of cyber prints.

Our Cybercrime Intelligence service allows you to tag identifiers for receiving alerts and notifications based on a variety of cyber prints, like but not limited to: cybercriminal profiles, email contacts, money accounts, keywords, and compromised data or brands, which could optimize the job of your cyber intelligence threat teams and investigators.

Some professionals use Cybercrime Intelligence from to:

  •     Receive new information from real underground communities;
  •     Monitor compromised banking accounts and leaked credit cards;
  •     Find new threats against financial institutions, governments, and companies;
  •     Gather information for cybercrime investigations.

“Cyber security professionals and investigators can use the tool to assess the vulnerability of their networks, protect their brand in cyber space, identify groups and hackers posing the threat, and package cases for civil or criminal action,” says Dan Clements, IntelCrawler President.

About IntelCrawler is a multi-tier intelligence aggregator, which gathers information and cyber prints from a starting big data pool of over 3, 000, 000, 000 IPv4 and over 200, 000, 000 domain names, which are scanned for analytic s and dissemination to drill down to a desired result. This finite pool of cyber prints is then narrowed further by comparing it to various databases and forum intelligence gathered from the underground and networked security company contacts. The final result could be the location of a particular keyboard or a computer housing the threat.

Contact: [email protected]

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Dan Clements
Visit website